BOYD State of Play

The Challenges, Risks and Concerns for Your Business.

BYOD table with office equipment

Nowadays, many companies have a BYOD (Bring Your Own Device) culture – the most typical present-day example is probably the smartphone. And although the BYOD culture is nothing new, AV tech has found creative ways of evolving it to fit current practices. But as we know only too well, new tech means new opportunities and ultimately… new challenges. As more devices and products come into the workplace, it’s inevitable that higher levels of security risks and concerns will emerge for you and your business


With this in mind, it’s time for a BYOD collaboration update.


From full conferencing systems to the latest cloud-based dashboards, there are always new product and solutions that can benefit your company. And it’s good to embrace these obviously but given the increasing amount of connectivity between business-owned equipment and user owned devices – with BYOD comes real risks.

First-up, with BYOD there is a greater possibility for human error, and more pathways for bad actors to take advantage of human error and other failures in protecting AV collaboration infrastructure. There’s a lot to think about…. this article is designed to help businesses to consider all the risks and to understand the things AV integrators can implement to help you to navigate these risks. Let’s explore….




The AV industry has a plethora of new products that have the potential to revolutionise the marketplace. There may be many things you might be simply curious but equally you may have some concerns and no doubt some of these will be legitimate. Here’s a few things to consider;




  • Collaboration Systems – With regards to medium sized conference rooms and huddle spaces, an integrated conferencing system can be very useful. Certain products are seamless and allow BYOD devices to become tools of collaboration. With a 10X zoom PTZ camera and audio-conferencing mixer, you can connect microphones and speakers directly to the camera. It’s a very BYOD-friendly system.


  • Browser-Based Platforms – Workflow and collaboration tools accessed through your browser can reduce many of the risks and challenges discussed below. There is a dashboard for everything – from managing a meeting or a calendar of display messages, to surveillance systems. Browser-based platforms are generally very user-friendly and balance security with flexibility.



BYO….. Bringing your own anything can involve some degree of risk, and naturally electronic devices pose some threats. You may be aware of some of these risks, but are not sure how to handle them? Here are a few key considerations you should be aware of, but bear in mind, Meritec can advise and implement effective security solutions… so talk to us early-on in your decision-making process


  • Employee Privacy – It’s not only the business itself that is at risk with the BYOD culture. Another substantial risk to be considered is employee privacy. According to one study, 77 percent of employees say they have not been trained about the risks of BYOD.

Essentially, while your employees like everyone expects their privacy rights to be adhered to – when an individual brings their device to work and connects to the network, potentially everyone can see the activity on the device. This potential ramification alone should be kept in mind.



  • Security – This is typically the most important thing to consider in the workplace. With all these devices coming in from at least 75% of your workforce, how do you handle network security? It is integral that IT and AV work together to make sure corporate data, networks and employees’ personal information are secure.




  • Compatibility – A key task for integrators comes in getting audio data and visual rendered and displayed across a large number of personal and company-owned devices. Many things can potentially go wrong in a presentation that works between the two. With such a vast array of software and hardware while working with both new and old systems and programs – all of these come together to create compatibility issues integrators face daily.




To begin, let’s examine the cost-benefit. You may question if BYOD will have the anticipated cost-benefit that some businesses envision it will. Security protocols and compliance might include mobile data management (MDM and enterprise mobility management (EMM.) These security protocols can add extra cost – no matter how much you try to minimise that.


Furthermore, network overload is another key worry with the culture of BYOD. As the number of devices on the market increase, the demand and strain on the network will naturally increase.

To combat this, AV integrators will have to collaborate with IT infrastructure decision-makers on planning for this kind of inevitable scaling up of the network in order to manage the growing demands.


Final words on BYOD

BYOD is not going anywhere. Overall, we can celebrate and acknowledge the ability it gives us to collaborate quickly and easily with fellow co-workers. That said, this collaboration must be managed in the right manner. AV integration has an important part to play as BYOD culture continues to develop and evolve within companies and in the wider work environment.


If you would like further help and support on AV and integrating effective solutions for your business then please contact us.